Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
python python 2.6.1 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2017-0906
The Recurly Client Python Library prior to 2.0.5, 2.1.16, 2.2.22, 2.3.1, 2.4.5, 2.5.1, 2.6.2 is vulnerable to a Server-Side Request Forgery vulnerability in the "Resource.get" method that could result in compromise of API keys or other critical resources.
Recurly Recurly Client Python
Recurly Recurly Client Python 2.3.0
Recurly Recurly Client Python 2.5.0
Recurly Recurly Client Python 2.6.1
Recurly Recurly Client Python 2.6.0
7.5
CVSSv2
CVE-2005-0088
The publisher handler for mod_python 2.7.8 and previous versions allows remote malicious users to obtain access to restricted objects via a crafted URL.
Apache Mod Python 1.9a
Apache Mod Python 2.0
Apache Mod Python 2.6
Apache Mod Python 2.6.1
Apache Mod Python 2.7.3
Apache Mod Python 2.7.4
Apache Mod Python 2.7.5
Apache Mod Python 2.1
Apache Mod Python 2.2
Apache Mod Python 2.6.2
Apache Mod Python 2.6.3
Apache Mod Python 2.7.6
Apache Mod Python 2.7.7
Apache Mod Python 2.3
Apache Mod Python 2.4
Apache Mod Python 2.6.4
Apache Mod Python 2.7
Apache Mod Python
Apache Mod Python 2.4.1
Apache Mod Python 2.5
Apache Mod Python 2.7.1
Apache Mod Python 2.7.2
6.8
CVSSv2
CVE-2008-6825
Directory traversal vulnerability in user/index.php in Fonality trixbox CE 2.6.1 and previous versions allows remote malicious users to include and execute arbitrary files via a .. (dot dot) in the langChoice parameter.
Trixbox Trixbox 2.0
Trixbox Trixbox 2.4.2.0
Trixbox Trixbox
3 EDB exploits
6.4
CVSSv2
CVE-2011-1521
The urllib and urllib2 modules in Python 2.x prior to 2.7.2 and 3.x prior to 3.2.1 process Location headers that specify redirection to file: URLs, which makes it easier for remote malicious users to obtain sensitive information or cause a denial of service (resource consumption)...
Python Python 2.5.2
Python Python 2.1.2
Python Python 2.3.3
Python Python 2.4.4
Python Python 2.4.2
Python Python 2.5.4
Python Python 2.4.6
Python Python 2.6.7
Python Python 2.3.2
Python Python 2.3.1
Python Python 2.4.3
Python Python 2.3.5
Python Python 2.5.1
Python Python 2.3.7
Python Python 2.1.3
Python Python 2.1
Python Python 2.2.1
Python Python 2.2.2
Python Python 2.2.3
Python Python 2.4.1
Python Python 2.0.1
Python Python 2.6.6
5
CVSSv2
CVE-2018-6594
lib/Crypto/PublicKey/ElGamal.py in PyCrypto up to and including 2.6.1 generates weak ElGamal key parameters, which allows malicious users to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The...
Dlitz Pycrypto
Debian Debian Linux 7.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 17.10
3 Github repositories
5
CVSSv2
CVE-2012-1150
Python prior to 2.6.8, 2.7.x prior to 2.7.3, 3.x prior to 3.1.5, and 3.2.x prior to 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent malicious users to cause a denial of service (CPU consumption) via...
Python Python 2.6.6
Python Python 2.6.5
Python Python 2.5.3
Python Python 2.5.6
Python Python 2.4.4
Python Python 2.4.2
Python Python 2.3.2
Python Python 2.3.1
Python Python
Python Python 2.6.6150
Python Python 2.5.150
Python Python 2.4.3
Python Python 2.3.3
Python Python 2.1.1
Python Python 2.1.2
Python Python 1.5.2
Python Python 1.2
Python Python 2.6.4
Python Python 2.6.3
Python Python 2.5.2
Python Python 2.5.1
Python Python 2.4.6
2 Github repositories
5
CVSSv2
CVE-2012-0845
SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python prior to 2.6.8, 2.7.x prior to 2.7.3, 3.x prior to 3.1.5, and 3.2.x prior to 3.2.3 allows remote malicious users to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smal...
Python Python 2.6.4
Python Python 2.6.3
Python Python 2.6.2150
Python Python 2.5.2
Python Python 2.5.1
Python Python 2.4.6
Python Python 2.6.6
Python Python 2.6.5
Python Python 2.5.3
Python Python 2.5.6
Python Python 2.4.4
Python Python 2.4.2
Python Python 2.3.2
Python Python 2.3.1
Python Python 2.3.7
Python Python 2.1.3
Python Python 2.1
Python Python 1.3
Python Python 0.9.1
Python Python
Python Python 2.6.6150
Python Python 2.5.150
4.3
CVSSv2
CVE-2021-41213
TensorFlow is an open source platform for machine learning. In affected versions the code behind `tf.function` API can be made to deadlock when two `tf.function` decorated Python functions are mutually recursive. This occurs due to using a non-reentrant `Lock` Python object. Load...
Google Tensorflow
Google Tensorflow 2.7.0
4.3
CVSSv2
CVE-2016-3076
Heap-based buffer overflow in the j2k_encode_entry function in Pillow 2.5.0 up to and including 3.1.1 allows remote malicious users to cause a denial of service (memory corruption) via a crafted Jpeg2000 file.
Python Pillow 2.9.0
Python Pillow 2.5.1
Python Pillow 2.5.2
Python Pillow 3.0.0
Python Pillow 2.5.3
Python Pillow 2.6.2
Python Pillow 2.6.0
Python Pillow 2.5.0
Python Pillow 2.7.0
Python Pillow 3.1.0
Python Pillow 2.6.1
Python Pillow 2.8.2
Python Pillow 2.8.1
Python Pillow 2.8.0
2 Github repositories
4.3
CVSSv2
CVE-2016-0775
Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow prior to 3.1.1 allows remote malicious users to cause a denial of service (crash) via a crafted FLI file.
Python Pillow
Debian Debian Linux 8.0
Debian Debian Linux 7.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »